You are here:
Secure-IC's Securyzr™ Tunable Hash (SHA3) Hardware accelerator
In the beginning of the 2000s, strong progress has been made on hacking NIST standard hash functions, which led to break of the SHA-1 algorithm. This achievement had a lot of consequences on the other NIST standard hash function, SHA-2, since both algorithms share a lot of similarities. In order to be prepared against an effective break of SHA-2, NIST launched a contest to choose a new hash standard, with original approach, different from those used for the previous ones. In 2012, the algorithm Keccak developed by a Western European team was selected as the winner of the NIST contest and became the new hash function standard known as SHA-3.
查看 Secure-IC's Securyzr™ Tunable Hash (SHA3) Hardware accelerator 详细介绍:
- 查看 Secure-IC's Securyzr™ Tunable Hash (SHA3) Hardware accelerator 完整数据手册
- 联系 Secure-IC's Securyzr™ Tunable Hash (SHA3) Hardware accelerator 供应商
PQC Ready - Crypto - SHAKE3 IP
- Securyzr™ neo Core Platform - One core, multiple products
- Secure-IC's Securyzr™ Tunable Hash (SHA1-SHA2) Hardware accelerator
- Post Quantum ready Public Key Crypto HW acceleration library optimized for networking applications
- Root of Trust eSecure module for SoC security
- Secure-IC's Securyzr™ Public Key Crypto Engine